Jump to content

MBAE 1.12.1.136 Experimental


hake

Recommended Posts

Correct, they cannot use a DLL injection protection method as they do for other processes due to Google's new policy regarding such methods, so they must be using some alternative method to attempt to shield it from exploits.  All of the executables listed under the list of shielded applications are injected with MBAE's DLL, but since Google prohibits this, they cannot use that method to shield the browser from exploits.

Link to post
Share on other sites

@Arthi:  Can you please confirm that your words "we have implemented an alternate approach to offer protection to Chrome and Edge users without DLL injection" mean that MBAE 1.12.1.136 includes this?

Edited by hake
Link to post
Share on other sites

On 11/12/2018 at 8:38 PM, Arthi said:

Hi,

Yes, we have implemented an alternate approach to offer protection to Chrome and Edge users without DLL injection.

Sometimes the best inovations come about because you get forced to do things differently from the 'norm', so have to think of something new.

Link to post
Share on other sites

Is it possibly to provide exploit protection with a browser extension, or plugin instead? It may be a lot of work maintaining the extensions, or plugins, but if you only had to do it for a few browsers then it may be an option. Malwarebytes already has a browser extension so maybe additional capabilities could be added to it.

Link to post
Share on other sites

They can't for Chrome as this move was specifically because Google's new policy prohibits it, which also means any browser extensions that use similar methods will be killed off/blocked eventually.  Also, I think part of the problem is that an extension/plugin is trapped inside the browser sort of like operating in a sandbox, which prevents the kind of overall process/thread access/monitoring required to check for exploit behavior in real-time.

Link to post
Share on other sites

I think they do it by monitoring process activity in memory just as they used to using the DLL injection method (they should be able to see what threads/processes/API calls etc. the process tries to make to look for exploit related behaviors and stop them pre-execution as they're mapped to memory; this is also how their primary Malware Protection component detects malicious processes/files as they attempt to execute in memory, detecting and quarantining them before the process actually enters memory space which would otherwise prevent removal of the file since its process would be running in memory and wouldn't prevent infection).  Of course I'm no developer, so that's just my hypothesis, but I'm probably not too far off the mark.

It may work similarly to how tools like Process Explorer and Process Monitor do, where they use a driver rather than DLL injection to monitor deep level process activity.  If they can do that and see exploit behavior attempts/thread initializations and stop them pre-execution, that would be sufficient to shield those applications which they can't inject a DLL into (like Google Chrome).

Link to post
Share on other sites

Also, regarding a browser extension, I believe Chrome, Edge and pretty much all browsers these days do in fact limit/restrict what plugins/extensions can and cannot see or do and how much control they can have as a means of protecting against more malicious behaviors and exploits by plugins and extensions, at least that's my understanding, but again, I'm no dev so I concede to anyone more versed in the field.

Link to post
Share on other sites

I have tried MBAE 1.12.1.136 on Windows 7 (64bit) and find that it seems to have imposed a performance penalty with Google Chrome (latest 32bit version).  Admittedly my hardware is 12 years old (Intel Pentium 4 twin core 3.2GHz processor) but using that slower hardware also emphasises the effects of performance hits.

Reverting to MBAE 1.12.1.109 restores performance to what was previously normal.  Google Chrome has not yet given MBAE 1.12.1.109 the sack.  When that happens, I shall probably give Google Chrome the sack.

Edited by hake
Link to post
Share on other sites

  • Staff
6 hours ago, hake said:

I have tried MBAE 1.12.1.136 on Windows 7 (64bit) and find that it seems to have imposed a performance penalty with Google Chrome (latest 32bit version).  Admittedly my hardware is 12 years old (Intel Pentium 4 twin core 3.2GHz processor) but using that slower hardware also emphasises the effects of performance hits.

Reverting to MBAE 1.12.1.109 restores performance to what was previously normal.  Google Chrome has not yet given MBAE 1.12.1.109 the sack.  When that happens, I shall probably give Google Chrome the sack.

Haha..Thanks hake for your support !! We will look into your issue. Trying to reproduce it at our end.

Link to post
Share on other sites

MBAE 1.12.1.137 is working well.  The performance dip in Google Chrome on my slow hardware was due to too many browser extensions which have been pruned down to the essential ones. I am now very satisfied and look forward to further developments.

It would be nice to see evidence in the log that Google Chrome is being protected, even if the details are not yet available to the user.

Edited by hake
Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.